Security

Reply
Frequent Contributor II
Posts: 144
Registered: ‎01-21-2015

CPPM Role-Mapping

[ Edited ]

Hi all,

I'm new in this field.

Can any one explain me how Role mapping works and when it triggers.

 

 

rana
Guru Elite
Posts: 8,321
Registered: ‎09-08-2010

Re: CPPM Role-Mapping

Role mapping is optional. It after authentication and before enforcement. The idea is to "tag" the request with as much information as possible and then use that information in the enforcement policy. 


Thanks, 
Tim

Tim Cappalli | Aruba Security TME
@timcappalli | timcappalli.me | ACMX #367 / ACCX #480
Frequent Contributor II
Posts: 144
Registered: ‎01-21-2015

Re: CPPM Role-Mapping

Thanks it helps.

rana
Frequent Contributor II
Posts: 144
Registered: ‎01-21-2015

Re: CPPM Role-Mapping

One more question, If the authentication type is post auth then?

rana
Guru Elite
Posts: 8,321
Registered: ‎09-08-2010

Re: CPPM Role-Mapping

Logically, yes, role mapping happens after authentication. It is part of the authorization "step".


Tim Cappalli | Aruba Security TME
@timcappalli | timcappalli.me | ACMX #367 / ACCX #480
Search Airheads
Showing results for 
Search instead for 
Did you mean: